Difference between revisions of "Authentication"
Jump to navigation
Jump to search
(Created page with "== Definition == <!--- ===National Definitions=== ==== United States==== ===== NIST===== {{definition|Verifying the identity of a user, process, or device, often as a...") |
|||
Line 1: | Line 1: | ||
== Definition == | == Definition == | ||
− | |||
===National Definitions=== | ===National Definitions=== | ||
Line 21: | Line 20: | ||
<!-- | <!-- | ||
==References== | ==References== | ||
− | |||
[[Category:Information]][[Category:Security]] | [[Category:Information]][[Category:Security]] | ||
{{#set:defined by=ISO|defined by=United States|defined by=NIST|defined by=IETF}} | {{#set:defined by=ISO|defined by=United States|defined by=NIST|defined by=IETF}} |
Revision as of 01:55, 25 December 2016
Contents
Definition
National Definitions
United States
NIST
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. [1]
International Standard
IETF
Authentication: The process of verifying an identity claimed by or for a system entity. [2]
ISO/IEC
Authentication is a process that is used to confirm that a claimed characteristic of an entity is actually correct. To authenticate is to verify that a characteristic or attribute that appears to be true is in fact true. [3]
See also
Notes